Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Turla
ID: 019abd9f3ed516d87569e282dc9cb5cf23899
Cybercrime
State-Sponsored
Threat types: Malware, Espionage, Intrusion
Progress: 38%
Completeness: 33%
Freshness: 50%
Operation zone: —
Aliases
Limited alias preview
| Snake | Venomous Bear | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Turla is a cyber espionage threat group that has been attributed to Russia's Federal Security Service (FSB). They have compromised victims in over 50 countries since at least 2004, spanning a range of industries including government, embassies, military, education, research and pharmaceutical companies. Turla is known for conducting watering hole and spearphishing campaigns, and leveraging in-house tools and malware, such as Uroburos. Ref: https://attack.mitre.org/groups/G0010/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1016.001 | Internet Connection Discovery | TA0007 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1027.005 | Indicator Removal from Tools | TA0005 |
|
| T1027.010 | Command Obfuscation | TA0005 |
|
| T1027.011 | Fileless Storage | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1055.001 | Dynamic-link Library Injection | TA0004 TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1059.006 | Python | TA0002 |
|
| T1059.007 | JavaScript | TA0002 |
|
| T1069.001 | Local Groups | TA0007 |
|
| T1069.002 | Domain Groups | TA0007 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1071.003 | Mail Protocols | TA0011 |
|
| T1078.003 | Local Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1087.001 | Local Account | TA0007 |
|
| T1087.002 | Domain Account | TA0007 |
|
| T1090.001 | Internal Proxy | TA0011 |
|
| T1102.002 | Bidirectional Communication | TA0011 |
|
| T1134.002 | Create Process with Token | TA0004 TA0005 |
|
| T1204.001 | Malicious Link | TA0002 |
|
| T1518.001 | Security Software Discovery | TA0007 |
|
| T1546.003 | Windows Management Instrumentation Event Subscription | TA0003 TA0004 |
|
| T1546.013 | PowerShell Profile | TA0003 TA0004 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1547.004 | Winlogon Helper DLL | TA0003 TA0004 |
|
| T1553.006 | Code Signing Policy Modification | TA0005 |
|
| T1555.004 | Windows Credential Manager | TA0006 |
|
| T1560.001 | Archive via Utility | TA0009 |
|
| T1562.001 | Disable or Modify Tools | TA0005 |
|
| T1564.012 | File/Path Exclusions | TA0005 |
|
| T1566.002 | Spearphishing Link | TA0001 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1583.006 | Web Services | TA0042 |
|
| T1584.003 | Virtual Private Server | TA0042 |
|
| T1584.004 | Server | TA0042 |
|
| T1584.006 | Web Services | TA0042 |
|
| T1587.001 | Malware | TA0042 |
|
| T1588.001 | Malware | TA0042 |
|
| T1588.002 | Tool | TA0042 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.